default search action
Guangwu Hu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c26]Xiang Zhou, Xi Xiao, Qing Li, Bin Zhang, Guangwu Hu, Xiapu Luo, Tianwei Zhang:
CapsuleFormer: A Capsule and Transformer combined model for Decentralized Application encrypted traffic classification. AsiaCCS 2024 - [c25]Yuxin Cao, Jinghao Li, Xi Xiao, Derui Wang, Minhui Xue, Hao Ge, Wei Liu, Guangwu Hu:
LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything Model. SP (Workshops) 2024: 48-56 - [i1]Yuxin Cao, Jinghao Li, Xi Xiao, Derui Wang, Minhui Xue, Hao Ge, Wei Liu, Guangwu Hu:
LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything Model. CoRR abs/2403.11656 (2024) - 2023
- [j32]Zhaorui Ma, Shicheng Zhang, Na Li, Tianao Li, Xinhao Hu, Hao Feng, Qinglei Zhou, Fenlin Liu, Xiaowen Quan, Hongjian Wang, Guangwu Hu, Shubo Zhang, Yaqi Zhai, Shuaibin Chen, Shuaiwei Zhang:
GraphNEI: A GNN-based network entity identification method for IP geolocation. Comput. Networks 235: 109946 (2023) - [j31]Zhutian Lin, Xi Xiao, Guangwu Hu, Qing Li, Bin Zhang, Xiapu Luo:
Tracking phishing on Ethereum: Transaction network embedding approach for accounts representation learning. Comput. Secur. 135: 103479 (2023) - [j30]Chuqing Zhang, Jiangyuan Yao, Guangwu Hu, Xingcan Cao:
A Machine Learning Based Funding Project Evaluation Decision Prediction. Comput. Syst. Sci. Eng. 45(2): 2111-2124 (2023) - [j29]Guangwu Hu, Xi Xiao, Meng Shen, Bin Zhang, Xia Yan, Yunxia Liu:
TCGNN: Packet-grained network traffic classification via Graph Neural Networks. Eng. Appl. Artif. Intell. 123(Part C): 106531 (2023) - [j28]Jiangtao Ma, Chenyu Zhou, Yonggang Chen, Yanjun Wang, Guangwu Hu, Yaqiong Qiao:
TeCre: A Novel Temporal Conflict Resolution Method Based on Temporal Knowledge Graph Embedding. Inf. 14(3): 155 (2023) - [j27]Zhaorui Ma, Xinhao Hu, Na Li, Hao Feng, Shicheng Zhang, Tianao Li, Fenlin Liu, Qinglei Zhou, Zhankui Tian, Hongjian Wang, Guangwu Hu:
HGL_GEO: Finer-grained IPv6 geolocation algorithm based on hypergraph learning. Inf. Process. Manag. 60(6): 103518 (2023) - [j26]Zhaorui Ma, Shicheng Zhang, Xinhao Hu, Na Li, Qinglei Zhou, Fenlin Liu, Hongjian Wang, Guangwu Hu, Qilin Dong:
GWS-Geo: A graph neural network based model for street-level IPv6 geolocation. J. Inf. Secur. Appl. 75: 103511 (2023) - [c24]Zhenyu Yang, Xi Xiao, Bin Zhang, Guangwu Hu, Qing Li, Qixu Liu:
AAP: Defending Against Website Fingerprinting Through Burst Obfuscation. ADMA (5) 2023: 107-121 - [c23]Renjie Xiao, Xi Xiao, Le Yu, Bin Zhang, Guangwu Hu, Qing Li:
ReviewLocator: Enhance User Review-Based Bug Localization with Bug Reports. ADMA (5) 2023: 122-136 - [c22]Ruohao Wu, Xi Xiao, Guangwu Hu, Hanqing Zhao, Han Zhang, Yongqing Peng:
DetOH: An Anchor-Free Object Detector with Only Heatmaps. ADMA (2) 2023: 152-167 - [c21]Ruohao Wu, Xi Xiao, Guangwu Hu, Hanqing Zhao, Han Zhang, Yongqing Peng:
Fibonet: A Light-weight and Efficient Neural Network for Image Segmentation. ICIP 2023: 1345-1349 - [c20]Tiru Wu, Xi Xiao, Qing Li, Qixu Liu, Guangwu Hu, Xiapu Luo, Yong Jiang:
BehavSniffer: Sniff User Behaviors from the Encrypted Traffic by Traffic Burst Graphs. SECON 2023: 456-464 - [c19]Zhutian Lin, Xi Xiao, Guangwu Hu, Bin Zhang, Qixu Liu, Xiapu Luo:
Phish2vec: A Temporal and Heterogeneous Network Embedding Approach for Detecting Phishing Scams on Ethereum. SECON 2023: 501-509 - [c18]Lianpei Zhou, Xi Xiao, Guangwu Hu, Hao Li, Xiangbo Wu, Tao Zhou:
A lightweight and high-precision approach for bulky JavaScript engines fuzzing. TrustCom 2023: 982-989 - 2022
- [j25]Jiangtao Ma, Chenyu Zhou, Yanjun Wang, Yifan Guo, Guangwu Hu, Yaqiong Qiao, Yong Wang:
PTrustE: A high-accuracy knowledge graph noise detection method based on path trustworthiness and triple embedding. Knowl. Based Syst. 256: 109688 (2022) - [c17]Ziyu Wei, Xi Xiao, Bin Zhang, Guangwu Hu, Qing Li, Shutao Xia:
Graph Data Augmentation for Node Classification. ICPR 2022: 4899-4905 - 2021
- [j24]Yanjun Wang, Liang Zhu, Jiangtao Ma, Guangwu Hu, Jiangchuan Liu, Yaqiong Qiao:
Knowledge Graph-Based Spatial-Aware User Community Preference Query Algorithm for LBSNs. Big Data Res. 23: 100169 (2021) - [j23]Xi Xiao, Wentao Xiao, Dianyan Zhang, Bin Zhang, Guangwu Hu, Qing Li, Shutao Xia:
Phishing websites detection via CNN and multi-head self-attention on imbalanced datasets. Comput. Secur. 108: 102372 (2021) - [j22]Guangwu Hu, Bin Zhang, Xi Xiao, Weizhe Zhang, Long Liao, Ying Zhou, Xia Yan:
SAMLDroid: A Static Taint Analysis and Machine Learning Combined High-Accuracy Method for Identifying Android Apps with Location Privacy Leakage Risks. Entropy 23(11): 1489 (2021) - [j21]Xi Xiao, Yuqing Pan, Bin Zhang, Guangwu Hu, Qing Li, Runiu Lu:
ALBFL: A novel neural ranking model for software fault localization via combining static and dynamic features. Inf. Softw. Technol. 139: 106653 (2021) - [c16]Haijun Feng, Wen Qin, Huijing Wang, Yi Li, Guangwu Hu:
A Combination of Resampling and Ensemble Method for Text Classification on Imbalanced Data. BigData 2021: 3-16 - [c15]Xun Sun, Xi Xiao, Wentao Xiao, Bin Zhang, Guangwu Hu, Tian Wang:
Short and Distort Manipulations in the Cryptocurrency Market: Case Study, Patterns and Detection. ICA3PP (3) 2021: 494-508 - [c14]Ziyu Wei, Xi Xiao, Guangwu Hu, Bin Zhang, Qing Li, Shutao Xia:
A Novel and High-Accuracy Rumor Detection Approach using Kernel Subtree and Deep Learning Networks. IJCNN 2021: 1-8 - [c13]Kelong Mao, Xi Xiao, Guangwu Hu, Xiapu Luo, Bin Zhang, Shutao Xia:
Byte-Label Joint Attention Learning for Packet-grained Network Traffic Classification. IWQoS 2021: 1-10 - [c12]Yunhao Xiao, Xi Xiao, Fang Tian, Guangwu Hu:
A LambdaMart-Based High-Accuracy Approach for Software Automatic Fault Localization. WASA (2) 2021: 249-261 - 2020
- [j20]Guangwu Hu, Qing Li, Shuo Ai, Tan Chen, Jingpu Duan, Yu Wu:
A proactive auto-scaling scheme with latency guarantees for multi-tenant NFV cloud. Comput. Networks 181: 107552 (2020) - [j19]Zhendong Peng, Xi Xiao, Guangwu Hu, Arun Kumar Sangaiah, Mohammed Atiquzzaman, Shutao Xia:
ABFL: An autoencoder based practical approach for software fault localization. Inf. Sci. 510: 108-121 (2020) - [j18]Chaoqin Zhang, Penghao Sun, Guangwu Hu, Liang Zhu:
RETCAM: An efficient TCAM compression model for flow table of OpenFlow. J. Commun. Networks 22(6): 484-492 (2020) - [j17]Xi Xiao, Dianyan Zhang, Guangwu Hu, Yong Jiang, Shutao Xia:
CNN-MHSA: A Convolutional Neural Network and multi-head self-attention combined approach for detecting phishing websites. Neural Networks 125: 303-312 (2020) - [c11]Yuqing Pan, Xi Xiao, Guangwu Hu, Bin Zhang, Qing Li, Haitao Zheng:
ALBFL: A Novel Neural Ranking Model for Software Fault Localization via Combining Static and Dynamic Features. TrustCom 2020: 785-792
2010 – 2019
- 2019
- [j16]Xi Xiao, Shaofeng Zhang, Francesco Mercaldo, Guangwu Hu, Arun Kumar Sangaiah:
Android malware detection based on system call sequences and LSTM. Multim. Tools Appl. 78(4): 3979-3999 (2019) - [j15]Jiangtao Ma, Yaqiong Qiao, Guangwu Hu, Yanjun Wang, Chaoqin Zhang, Yongzhong Huang, Arun Kumar Sangaiah, Huaiguang Wu, Hongpo Zhang, Kai Ren:
ELPKG: A High-Accuracy Link Prediction Approach for Knowledge Graph Completion. Symmetry 11(9): 1096 (2019) - [c10]Zhixiang Wang, Xi Xiao, Guangwu Hu, Yao Yao, Dianyan Zhang, Zhendong Peng, Qing Li, Shutao Xia:
Non-local Self-attention Structure for Function Approximation in Deep Reinforcement Learning. ICASSP 2019: 3042-3046 - 2018
- [j14]Jiangtao Ma, Yaqiong Qiao, Guangwu Hu, Yongzhong Huang, Arun Kumar Sangaiah, Chaoqin Zhang, Yanjun Wang, Rui Zhang:
De-Anonymizing Social Networks With Random Forest Classifier. IEEE Access 6: 10139-10150 (2018) - [j13]Chaoqin Zhang, Guangwu Hu, Guolong Chen, Arun Kumar Sangaiah, Ping'an Zhang, Xia Yan, Weijin Jiang:
Towards a SDN-Based Integrated Architecture for Mitigating IP Spoofing Attack. IEEE Access 6: 22764-22777 (2018) - [j12]Xi Xiao, Chunhui Chen, Arun Kumar Sangaiah, Guangwu Hu, Runguo Ye, Yong Jiang:
CenLocShare: A centralized privacy-preserving location-sharing system for mobile online social networks. Future Gener. Comput. Syst. 86: 863-872 (2018) - [j11]Jiangtao Ma, Yaqiong Qiao, Guangwu Hu, Tong Li, Yongzhong Huang, Yanjun Wang, Chaoqin Zhang:
Social account linking via weighted bipartite graph matching. Int. J. Commun. Syst. 31(7) (2018) - [j10]Ruibo Yan, Xi Xiao, Guangwu Hu, Sancheng Peng, Yong Jiang:
New deep learning method to detect code injection attacks on hybrid applications. J. Syst. Softw. 137: 67-77 (2018) - 2017
- [j9]Xi Xiao, Peng Fu, Guangwu Hu, Arun Kumar Sangaiah, Haitao Zheng, Yong Jiang:
SAIDR: A New Dynamic Model for SMS-Based Worm Propagation in Mobile Networks. IEEE Access 5: 9935-9943 (2017) - [j8]Jiangtao Ma, Yaqiong Qiao, Guangwu Hu, Yongzhong Huang, Meng Wang, Arun Kumar Sangaiah, Chaoqin Zhang, Yanjun Wang:
Balancing User Profile and Social Network Structure for Anchor Link Inferring Across Multiple Online Social Networks. IEEE Access 5: 12031-12040 (2017) - [j7]Wenlong Chen, Mingshu Zhang, Guangwu Hu, Xiaolan Tang, Arun Kumar Sangaiah:
Constrained Random Routing Mechanism for Source Privacy Protection in WSNs. IEEE Access 5: 23171-23181 (2017) - [j6]Xi Xiao, Peng Fu, Changsheng Dou, Qing Li, Guangwu Hu, Shutao Xia:
Design and analysis of SEIQR worm propagation model in mobile internet. Commun. Nonlinear Sci. Numer. Simul. 43: 341-350 (2017) - [j5]Guangwu Hu, Wenlong Chen, Qi Li, Yong Jiang, Ke Xu:
TrueID: A practical solution to enhance Internet accountability by assigning packets with creditable user identity code. Future Gener. Comput. Syst. 72: 219-226 (2017) - [j4]Xi Xiao, Peng Fu, Qing Li, Guangwu Hu, Yong Jiang:
Modeling and validation of SMS worm propagation over social networks. J. Comput. Sci. 21: 132-139 (2017) - [c9]Dingmin Wang, Qing Li, Yong Jiang, Mingwei Xu, Guangwu Hu:
Balancer: A Traffic-Aware Hybrid Rule Allocation Scheme in Software Defined Networks. ICCCN 2017: 1-9 - 2016
- [c8]Wenlong Chen, Lijing Lan, Xiaolan Tang, Shuo Zhang, Guangwu Hu:
Real-Time Dynamic Decomposition Storage of Routing Tables. CollaborateCom 2016: 353-362 - [c7]Zhenzhen Sun, Wenlong Chen, Xiaolan Tang, Guangwu Hu:
Routing Model Based on Service Degree and Residual Energy in WSN. CollaborateCom 2016: 363-372 - [c6]Guolong Chen, Guangwu Hu, Yong Jiang, Chaoqin Zhang:
SAVSH: IP source address validation for SDN hybrid networks. ISCC 2016: 409-414 - [c5]Qing Li, Bin Gan, Guangwu Hu, Yong Jiang, Qingmin Liao, Mingwei Xu:
MSRT: Multi-Source Request and Transmission in Content-Centric Networks. IWQoS 2016: 1-10 - [c4]Qing Li, Lei Wang, Yong Jiang, Guangwu Hu, Mingwei Xu, Qingmin Liao:
FICUS: Fast Incremental Consistent Update in SDN based on relation graph. IWQoS 2016: 1-6 - 2015
- [j3]Tan Chen, Guangwu Hu:
Reliable Multipath Transmission in Data Center Network. J. Commun. 10(12): 939-946 (2015) - 2014
- [j2]Ke Xu, Min Zhu, Guangwu Hu, Liang Zhu, Yifeng Zhong, Ying Liu, Jianping Wu, Ning Wang:
Towards evolvable Internet architecture-design constraints and models analysis. Sci. China Inf. Sci. 57(11): 1-24 (2014) - 2013
- [j1]Guangwu Hu, Ke Xu, Jianping Wu, Yong Cui, Fan Shi:
A general framework of source address validation and traceback for IPv4/IPv6 transition scenarios. IEEE Netw. 27(6): 66-73 (2013) - [c3]Guangwu Hu, Ke Xu, Jianping Wu:
SuperFlow: A Reliable, Controllable and Scalable Architecture for Large-Scale Enterprise Networks. HPCC/EUC 2013: 1195-1202 - 2012
- [c2]Guangwu Hu, Chaoqin Zhang:
MR-OLSR: A link state routing algorithm in multi-radio/multi-channel Wireless Mesh Networks. APCC 2012: 883-888 - 2011
- [c1]Guangwu Hu, Jianping Wu, Ke Xu, Wenlong Chen:
SAVT: A Practical Scheme for Source Address Validation and Traceback in Campus Network. ICCCN 2011: 1-8
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 19:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint